Characterizing ideal weighted threshold secret sharing

A Beimel, T Tassa, E Weinreb - Theory of Cryptography: Second Theory of …, 2005 - Springer
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret
sharing. In such settings, there is a set of users where each user is assigned a positive …

Attribute-based pseudonymity for privacy-preserving authentication in cloud services

V Sucasas, G Mantas, M Papaioannou… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Attribute-based authentication is considered a cornerstone component to achieve scalable
fine-grained access control in the fast growing market of cloud-based services …

Ideal multipartite secret sharing schemes

O Farràs, J Martí-Farré, C Padró - Journal of cryptology, 2012 - Springer
Multipartite secret sharing schemes are those having a multipartite access structure, in
which the set of participants is divided into several parts and all participants in the same part …

Ideal multipartite secret sharing schemes

O Farras, J Martí-Farré, C Padró - … on the Theory and Applications of …, 2007 - Springer
Multipartite secret sharing schemes are those having a multipartite access structure, in
which the set of participants is divided into several parts and all participants in the same part …

Characterizing ideal weighted threshold secret sharing

A Beimel, T Tassa, E Weinreb - SIAM Journal on Discrete Mathematics, 2008 - SIAM
Weighted threshold secret sharing was introduced by Shamir in his seminal work on secret
sharing. In such settings, there is a set of users where each user is assigned a positive …

On codes, matroids, and secure multiparty computation from linear secret-sharing schemes

R Cramer, V Daza, I Gracia, JJ Urroz… - IEEE Transactions …, 2008 - ieeexplore.ieee.org
Error-correcting codes and matroids have been widely used in the study of ordinary secret
sharing schemes. In this paper, the connections between codes, matroids, and a special …

Lecture notes in secret sharing

C Padró - Cryptology ePrint Archive, 2012 - eprint.iacr.org
These are basically the lecture notes for the short course" Applications of Combinatorics to
Information-Theoretic Cryptography", Central European University, Budapest, May-June …

On secret sharing schemes, matroids and polymatroids

J Martí-Farré, C Padró - Theory of Cryptography Conference, 2007 - Springer
One of the main open problems in secret sharing is the characterization of the access
structures of ideal secret sharing schemes. As a consequence of the results by Brickell and …

[HTML][HTML] Hypergraph decomposition and secret sharing

G Di Crescenzo, C Galdi - Discrete Applied Mathematics, 2009 - Elsevier
A secret sharing scheme is a protocol by which a dealer distributes a secret among a set of
participants in such a way that only qualified sets of them can reconstruct the value of the …

[PDF][PDF] Secure data outsourcing based on threshold secret sharing; towards a more practical solution

MA Hadavi, R Jalili - Proc. VLDB PhD Workshop, 2010 - vldb.org
Database outsourcing is a noteworthy solution to improve quality of services while reducing
data management costs. When data is stored and processed out of the territory of its owner …